Home
last modified time | relevance | path

Searched refs:msg_len (Results 1 – 25 of 147) sorted by relevance

123456

/freebsd/crypto/krb5/src/lib/kadm5/
H A Dchpass_util.c59 unsigned int msg_len) in _kadm5_chpass_principal_util() argument
94 msg_len - 1); in _kadm5_chpass_principal_util()
95 msg_ret[msg_len - 1] = '\0'; in _kadm5_chpass_principal_util()
98 snprintf(msg_ret, msg_len, "%s %s\n\n%s", in _kadm5_chpass_principal_util()
102 msg_ret[msg_len - 1] = '\0'; in _kadm5_chpass_principal_util()
110 strncpy(msg_ret, string_text(CHPASS_UTIL_NO_PASSWORD_READ), msg_len - 1); in _kadm5_chpass_principal_util()
111 msg_ret[msg_len - 1] = '\0'; in _kadm5_chpass_principal_util()
127 strncpy(msg_ret, string_text(CHPASS_UTIL_PASSWORD_CHANGED), msg_len - 1); in _kadm5_chpass_principal_util()
128 msg_ret[msg_len - 1] = '\0'; in _kadm5_chpass_principal_util()
136 snprintf(msg_ret, msg_len, "%s\n%s %s\n", in _kadm5_chpass_principal_util()
[all …]
/freebsd/crypto/openssl/ssl/statem/
H A Dstatem_dtls.c20 #define RSMBLY_BITMASK_SIZE(msg_len) (((msg_len) + 7) / 8) argument
37 #define RSMBLY_BITMASK_IS_COMPLETE(bitmask, msg_len, is_complete) \
41 if (bitmask[(((msg_len) - 1) >> 3)] != bitmask_end_values[((msg_len) & 7)]) \
44 for (ii = (((msg_len) - 1) >> 3) - 1; ii >= 0; ii--) \
137 if (!ossl_assert(s->init_num == s->d1->w_msg_hdr.msg_len + DTLS1_HM_HEADER_LENGTH)) in dtls1_do_write()
301 l2n3(msg_hdr->msg_len, p); in dtls1_do_write()
304 l2n3(msg_hdr->msg_len, p); in dtls1_do_write()
348 size_t msg_len; in dtls_get_message()
33 RSMBLY_BITMASK_IS_COMPLETE(bitmask,msg_len,is_complete) global() argument
341 size_t msg_len; dtls_get_message() local
400 size_t msg_len = s->init_num + DTLS1_HM_HEADER_LENGTH; dtls_get_message_body() local
449 size_t frag_off, frag_len, msg_len; dtls1_preprocess_fragment() local
[all...]
/freebsd/sys/dev/ipmi/
H A Dipmi_opal.c82 opal_ipmi_recv(struct opal_ipmi_softc *sc, uint64_t *msg_len, int timo) in opal_ipmi_recv() argument
91 *msg_len = sizeof(struct opal_ipmi_msg) + IPMI_MAX_RX; in opal_ipmi_recv()
95 vtophys(sc->sc_msg), vtophys(msg_len)); in opal_ipmi_recv()
96 *msg_len = be64toh(*msg_len); in opal_ipmi_recv()
113 sc->sc_msg->data[0], *msg_len); in opal_ipmi_recv()
127 uint64_t msg_len; in opal_ipmi_discard_msgs() local
134 err = opal_ipmi_recv(sc, &msg_len, 100); in opal_ipmi_discard_msgs()
138 err = opal_ipmi_recv(sc, &msg_len, 10); in opal_ipmi_discard_msgs()
149 uint64_t msg_len; in opal_ipmi_polled_request() local
170 msg_len = sizeof(*sc->sc_msg) + req->ir_requestlen; in opal_ipmi_polled_request()
[all …]
/freebsd/crypto/openssh/
H A Dmsg.c70 u_int msg_len; in ssh_msg_recv() local
80 msg_len = get_u32(buf); in ssh_msg_recv()
81 if (msg_len > sshbuf_max_size(m)) { in ssh_msg_recv()
82 error_f("read: bad msg_len %u", msg_len); in ssh_msg_recv()
86 if ((r = sshbuf_reserve(m, msg_len, &p)) != 0) { in ssh_msg_recv()
90 if (atomicio(read, fd, p, msg_len) != msg_len) { in ssh_msg_recv()
H A Dssh-pkcs11-helper.c277 u_int msg_len; in process() local
288 msg_len = get_u32(cp); in process()
289 if (msg_len > MAX_MSG_LENGTH) { in process()
290 error("bad message len %d", msg_len); in process()
293 if (buf_len < msg_len + 4) in process()
322 if (msg_len < consumed) { in process()
323 error("msg_len %d < consumed %d", msg_len, consumed); in process()
326 if (msg_len > consumed) { in process()
327 if ((r = sshbuf_consume(iqueue, msg_len - consumed)) != 0) in process()
/freebsd/crypto/openssl/crypto/sm2/
H A Dsm2_crypt.c88 size_t msg_len, size_t *ct_size) in ossl_sm2_ciphertext_size() argument
100 + ASN1_object_size(0, msg_len, V_ASN1_OCTET_STRING); in ossl_sm2_ciphertext_size()
109 const uint8_t *msg, size_t msg_len, in ossl_sm2_encrypt() argument
183 msg_mask = OPENSSL_zalloc(msg_len); in ossl_sm2_encrypt()
208 if (!ossl_ecdh_kdf_X9_63(msg_mask, msg_len, x2y2, 2 * field_size, NULL, 0, in ossl_sm2_encrypt()
214 if (is_all_zeros(msg_mask, msg_len)) { in ossl_sm2_encrypt()
219 for (i = 0; i != msg_len; ++i) in ossl_sm2_encrypt()
229 || EVP_DigestUpdate(hash, msg, msg_len) == 0 in ossl_sm2_encrypt()
246 || !ASN1_OCTET_STRING_set(ctext_struct.C2, msg_mask, msg_len)) { in ossl_sm2_encrypt()
295 int msg_len in ossl_sm2_decrypt() local
[all...]
/freebsd/contrib/tcpdump/
H A Dprint-olsr.c92 nd_uint16_t msg_len; member
102 nd_uint16_t msg_len; member
320 u_int msg_type, msg_len, msg_tlen, hello_len; in olsr_print() local
366 msg_len = GET_BE_U_2(msgptr.v6->msg_len); in olsr_print()
367 if ((msg_len >= sizeof (struct olsr_msg6)) in olsr_print()
368 && (msg_len <= length)) in olsr_print()
372 if (msg_type == 0 || msg_len == 0) { in olsr_print()
384 msg_len, (msg_len_valid == 0) ? " (invalid)" : ""); in olsr_print()
389 msg_tlen = msg_len - sizeof(struct olsr_msg6); in olsr_print()
395 msg_len = GET_BE_U_2(msgptr.v4->msg_len); in olsr_print()
[all …]
H A Dprint-ldp.c578 u_short pdu_len,msg_len,msg_type; in ldp_pdu_print() local
625 msg_len=GET_BE_U_2(ldp_msg_header->length); in ldp_pdu_print()
628 if (msg_len < sizeof(struct ldp_msg_header)-4) { in ldp_pdu_print()
636 msg_len, in ldp_pdu_print()
647 msg_len, in ldp_pdu_print()
652 msg_tlen=msg_len-(sizeof(struct ldp_msg_header)-4); /* Type & Length fields not included */ in ldp_pdu_print()
655 ND_TCHECK_LEN(tptr, msg_len); in ldp_pdu_print()
694 msg_len); in ldp_pdu_print()
696 tptr += msg_len+4; in ldp_pdu_print()
697 tlen -= msg_len+4; in ldp_pdu_print()
/freebsd/crypto/openssl/crypto/slh_dsa/
H A Dslh_dsa.c35 * @param msg_len The size of |msg|
43 const uint8_t *msg, size_t msg_len, in slh_sign_internal() argument
97 if (!hashf->PRF_MSG(hctx, SLH_DSA_SK_PRF(priv), opt_rand, msg, msg_len, wpkt) in slh_sign_internal()
99 || !hashf->H_MSG(hctx, r, pk_seed, SLH_DSA_PK_ROOT(priv), msg, msg_len, in slh_sign_internal()
142 * @param msg_len The size of |msg|
148 const uint8_t *msg, size_t msg_len, in slh_verify_internal() argument
186 if (!hashf->H_MSG(hctx, r, pk_seed, pk_root, msg, msg_len, in slh_verify_internal()
218 * @param msg_len The size of |msg|
231 static uint8_t *msg_encode(const uint8_t *msg, size_t msg_len, in msg_encode() argument
240 *out_len = msg_len; in msg_encode()
268 ossl_slh_dsa_sign(SLH_DSA_HASH_CTX * slh_ctx,const uint8_t * msg,size_t msg_len,const uint8_t * ctx,size_t ctx_len,const uint8_t * add_rand,int encode,unsigned char * sig,size_t * siglen,size_t sigsize) ossl_slh_dsa_sign() argument
294 ossl_slh_dsa_verify(SLH_DSA_HASH_CTX * slh_ctx,const uint8_t * msg,size_t msg_len,const uint8_t * ctx,size_t ctx_len,int encode,const uint8_t * sig,size_t sig_len) ossl_slh_dsa_verify() argument
[all...]
H A Dslh_hash.c67 const uint8_t *msg, size_t msg_len, in slh_hmsg_shake() argument
75 msg, msg_len, out, m); in slh_hmsg_shake()
92 const uint8_t *opt_rand, const uint8_t *msg, size_t msg_len, in slh_prf_msg_shake() argument
99 return xof_digest_3(ctx->md_ctx, sk_prf, n, opt_rand, n, msg, msg_len, out, n) in slh_prf_msg_shake()
151 const uint8_t *pk_root, const uint8_t *msg, size_t msg_len, in slh_hmsg_sha2() argument
166 return digest_4(hctx->md_big_ctx, r, n, pk_seed, n, pk_root, n, msg, msg_len, in slh_hmsg_sha2()
174 const uint8_t *msg, size_t msg_len, WPACKET *pkt) in slh_prf_msg_sha2() argument
205 && EVP_MAC_update(mctx, msg, msg_len) == 1 in slh_prf_msg_sha2()
/freebsd/crypto/krb5/src/kadmin/server/
H A Dmisc.c19 char *msg_ret, unsigned int msg_len) in schpw_util_wrapper() argument
36 msg_len); in schpw_util_wrapper()
40 ret = check_min_life(server_handle, target, msg_ret, msg_len); in schpw_util_wrapper()
50 msg_ret, msg_len); in schpw_util_wrapper()
53 strlcpy(msg_ret, "Unauthorized request", msg_len); in schpw_util_wrapper()
61 char *msg_ret, unsigned int msg_len) in check_min_life() argument
102 if (strlen(errstr) + strlen(time_string) < msg_len) { in check_min_life()
105 snprintf(msg_ret, msg_len, errstr, time_string); in check_min_life()
/freebsd/crypto/krb5/src/lib/gssapi/spnego/
H A Dnegoex_util.c167 const uint8_t *msg_base, size_t msg_len) in vector_base() argument
169 if (offset > msg_len || count > (msg_len - offset) / width) in vector_base()
227 const uint8_t *msg_base, size_t msg_len, in parse_nego_message() argument
246 msg->schemes = vector_base(offset, count, GUID_LENGTH, msg_base, msg_len); in parse_nego_message()
255 p = vector_base(offset, count, EXTENSION_LENGTH, msg_base, msg_len); in parse_nego_message()
269 const uint8_t *msg_base, size_t msg_len, in parse_exchange_message() argument
281 p = vector_base(offset, len, 1, msg_base, msg_len); in parse_exchange_message()
294 const uint8_t *msg_base, size_t msg_len, in parse_verify_message() argument
319 msg->cksum = vector_base(offset, len, 1, msg_base, msg_len); in parse_verify_message()
332 const uint8_t *msg_base, size_t msg_len, in parse_alert_message() argument
[all …]
/freebsd/crypto/openssl/test/
H A Dsm2_internal_test.c139 const size_t msg_len = strlen(message); in test_sm2_crypt()
148 size_t recovered_len = msg_len; in test_sm2_crypt()
165 || !TEST_true(ossl_sm2_ciphertext_size(key, digest, msg_len, in test_sm2_crypt()
175 (const uint8_t *)message, msg_len, in test_sm2_crypt()
186 || !TEST_int_eq(ptext_len, msg_len)) in test_sm2_crypt()
193 || !TEST_int_eq(recovered_len, msg_len) in test_sm2_crypt()
194 || !TEST_mem_eq(recovered, recovered_len, message, msg_len)) in test_sm2_crypt()
308 const size_t msg_len = strlen(message); in test_sm2_sign()
338 strlen(userid), (const uint8_t *)message, msg_len); in test_sm2_sign()
354 strlen(userid), (const uint8_t *)message, msg_len); in test_sm2_sign()
140 const size_t msg_len = strlen(message); test_sm2_crypt() local
311 const size_t msg_len = strlen(message); test_sm2_sign() local
[all...]
H A Dslh_dsa_test.c232 td->msg, td->msg_len), in do_slh_dsa_verify()
279 td->msg, td->msg_len), in slh_dsa_sign_verify_test()
286 td->msg, td->msg_len), in slh_dsa_sign_verify_test()
382 size_t msg_len = sizeof(msg) - 1; in slh_dsa_usage_test()
407 if (!TEST_int_eq(EVP_PKEY_sign(sctx, NULL, &sig_len, msg, msg_len), 1) in slh_dsa_usage_test()
409 || !TEST_int_eq(EVP_PKEY_sign(sctx, sig, &sig_len, msg, msg_len), 1)) in slh_dsa_usage_test()
421 || !TEST_int_eq(EVP_PKEY_verify(vctx, sig, sig_len, msg, msg_len), 1)) in slh_dsa_usage_test()
452 size_t msg_len = sizeof(msg); in slh_dsa_deterministic_usage_test()
488 if (!TEST_int_eq(EVP_PKEY_sign(sctx, NULL, &sig_len, msg, msg_len), 1)) in slh_dsa_deterministic_usage_test()
492 || !TEST_int_eq(EVP_PKEY_sign(sctx, sig, &len, msg, msg_len), in slh_dsa_deterministic_usage_test()
375 size_t msg_len = sizeof(msg) - 1; slh_dsa_usage_test() local
445 size_t msg_len = sizeof(msg); slh_dsa_deterministic_usage_test() local
532 size_t msg_len = sizeof(msg); slh_dsa_digest_sign_verify_test() local
[all...]
H A Dml_dsa_test.c153 td->msg, td->msg_len), in ml_dsa_siggen_test()
160 td->msg, td->msg_len), in ml_dsa_siggen_test()
199 td->msg, td->msg_len), in ml_dsa_sigver_test()
373 size_t msg_len;
422 if (!TEST_int_eq(EVP_PKEY_sign(sctx, NULL, &sig_len, sp->msg, sp->msg_len), 1) in do_ml_dsa_sign_verify()
426 if (!TEST_int_eq(EVP_PKEY_sign(sctx, sig, &sig_len, sp->msg, sp->msg_len), 0)) in do_ml_dsa_sign_verify()
429 if (!TEST_int_eq(EVP_PKEY_sign(sctx, sig, &sig_len, sp->msg, sp->msg_len), 1) in do_ml_dsa_sign_verify()
432 || !TEST_int_eq(EVP_PKEY_verify(vctx, sig, sig_len, sp->msg, sp->msg_len), 1)) in do_ml_dsa_sign_verify()
490 if (!TEST_int_eq(EVP_DigestSign(mctx, NULL, &sig_len, sp->msg, sp->msg_len), 1) in ml_dsa_digest_sign_verify_test()
494 if (!TEST_int_eq(EVP_DigestSign(mctx, sig, &sig_len, sp->msg, sp->msg_len), in ml_dsa_digest_sign_verify_test()
366 size_t msg_len; global() member
[all...]
/freebsd/sys/dev/qat/qat_common/
H A Dadf_pfvf_vf_proto.c259 unsigned int msg_len; in adf_send_vf2pf_blkmsg_req() local
312 msg_len = in adf_send_vf2pf_blkmsg_req()
314 msg_len = min(*buffer_len, msg_len); in adf_send_vf2pf_blkmsg_req()
317 for (index = ADF_PFVF_BLKMSG_HEADER_SIZE; index < msg_len; index++) { in adf_send_vf2pf_blkmsg_req()
326 ret = adf_vf2pf_blkmsg_get_crc(accel_dev, type, msg_len, &remote_crc); in adf_send_vf2pf_blkmsg_req()
330 local_crc = adf_pfvf_calc_blkmsg_crc(buffer, msg_len); in adf_send_vf2pf_blkmsg_req()
341 *buffer_len = msg_len; in adf_send_vf2pf_blkmsg_req()
/freebsd/crypto/openssl/include/crypto/
H A Dsm2.h41 const uint8_t *msg, size_t msg_len);
48 const uint8_t *msg, size_t msg_len);
68 size_t msg_len, size_t *ct_size);
75 const uint8_t *msg, size_t msg_len,
/freebsd/sys/arm/broadcom/bcm2835/
H A Dbcm2835_firmware.c116 size_t msg_len; in bcm2835_firmware_property() local
126 msg_len = sizeof(*msg_hdr) + len + sizeof(uint32_t); in bcm2835_firmware_property()
127 msg_hdr = malloc(sizeof(*msg_hdr) + msg_len + sizeof(uint32_t), in bcm2835_firmware_property()
130 msg_hdr->hdr.buf_size = msg_len; in bcm2835_firmware_property()
137 err = bcm2835_mbox_property(msg_hdr, msg_len); in bcm2835_firmware_property()
/freebsd/crypto/openssl/crypto/ml_dsa/
H A Dml_dsa_sign.c313 * @param msg_len The size of |msg|
326 static uint8_t *msg_encode(const uint8_t *msg, size_t msg_len,
335 *out_len = msg_len; in msg_encode()
342 encoded_len = 1 + 1 + ctx_len + msg_len; in msg_encode()
354 memcpy(&encoded[2 + ctx_len], msg, msg_len); in msg_encode()
364 const uint8_t *msg, size_t msg_len,
380 m_len = msg_len; in ossl_ml_dsa_sign()
382 m = msg_encode(msg, msg_len, context, context_len, encode, in ossl_ml_dsa_sign()
402 const uint8_t *msg, size_t msg_len,
416 m_len = msg_len; in ossl_ml_dsa_verify()
330 msg_encode(const uint8_t * msg,size_t msg_len,const uint8_t * ctx,size_t ctx_len,int encode,uint8_t * tmp,size_t tmp_len,size_t * out_len) msg_encode() argument
368 ossl_ml_dsa_sign(const ML_DSA_KEY * priv,int msg_is_mu,const uint8_t * msg,size_t msg_len,const uint8_t * context,size_t context_len,const uint8_t * rand,size_t rand_len,int encode,unsigned char * sig,size_t * sig_len,size_t sig_size) ossl_ml_dsa_sign() argument
406 ossl_ml_dsa_verify(const ML_DSA_KEY * pub,int msg_is_mu,const uint8_t * msg,size_t msg_len,const uint8_t * context,size_t context_len,int encode,const uint8_t * sig,size_t sig_len) ossl_ml_dsa_verify() argument
[all...]
/freebsd/crypto/openssl/fuzz/
H A Dslh-dsa.c316 size_t msg_len; in slh_dsa_sign_verify() local
341 msg_len = *len; in slh_dsa_sign_verify()
343 /* if msg_len > 255, sign_message_init will fail */ in slh_dsa_sign_verify()
344 if (msg_len > 255 && (selector & 0x1) != 0) in slh_dsa_sign_verify()
351 msg, msg_len); in slh_dsa_sign_verify()
387 OPENSSL_assert(EVP_PKEY_sign(ctx, NULL, &sig_len, msg, msg_len)); in slh_dsa_sign_verify()
391 OPENSSL_assert(EVP_PKEY_sign(ctx, sig, &sig_len, msg, msg_len)); in slh_dsa_sign_verify()
394 OPENSSL_assert(EVP_PKEY_verify(ctx, sig, sig_len, msg, msg_len)); in slh_dsa_sign_verify()
/freebsd/contrib/wpa/src/eap_server/
H A Deap_server_gtc.c55 size_t msg_len; in eap_gtc_buildReq() local
59 msg_len = os_strlen(msg); in eap_gtc_buildReq()
60 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, msg_len, in eap_gtc_buildReq()
69 wpabuf_put_data(req, msg, msg_len); in eap_gtc_buildReq()
/freebsd/crypto/krb5/src/lib/kadm5/clnt/
H A Dclnt_chpass_util.c10 unsigned int msg_len) in kadm5_chpass_principal_util() argument
16 new_pw, ret_pw, msg_ret, msg_len); in kadm5_chpass_principal_util()
/freebsd/crypto/krb5/src/lib/kadm5/srv/
H A Dsvr_chpass_util.c10 unsigned int msg_len) in kadm5_chpass_principal_util() argument
16 new_pw, ret_pw, msg_ret, msg_len); in kadm5_chpass_principal_util()
/freebsd/contrib/wpa/wpa_supplicant/
H A Dpreauth_test.c53 size_t *msg_len, void **data_pos) in wpa_alloc_eapol() argument
57 *msg_len = sizeof(*hdr) + data_len; in wpa_alloc_eapol()
58 hdr = os_malloc(*msg_len); in wpa_alloc_eapol()
80 size_t *msg_len, void **data_pos) in _wpa_alloc_eapol() argument
82 return wpa_alloc_eapol(wpa_s, type, data, data_len, msg_len, data_pos); in _wpa_alloc_eapol()
/freebsd/lib/libtacplus/
H A Dtaclib_private.h81 u_int16_t msg_len; member
108 u_int16_t msg_len; member
127 u_int16_t msg_len; member

123456